Top White Papers and Webcasts

  • On-demand Event Event Date: February 11, 2015 New computing platforms, expanding information environments, recurrent security breaches and evolving regulatory frameworks are factors that security executives must contend with and address when developing their security strategy. In response to these dynamics, security executives are seeking stronger, more nimble and more pervasive security technologies to help protect business-critical information from unauthorized disclosure, loss or corruption. Yet with an …

  • Live Event Date: February 25, 2015 @ 1:00 p.m. ET / 10:00 a.m. PT If there is a weakness in your IT security system, wouldn't it be better to find it before someone else does? The best way to do this is to put yourself into the hacker's role and perform all the activities they would do as well. The results can give you a perspective on what other people with bad intentions can see. Check out this upcoming eSeminar and join a panel of industry experts as they uncover the darker side of IT security and propose …